Multiple vulnerabilities have been reported in Microsoft Internet Explorer which could be exploited by an attacker to execute arbitrary code on the targeted system and gain privileges of the targeted user.

These vulnerabilities exist due to improper handling of objects in memory by the Microsoft Browser. A remote attacker could exploit these vulnerabilities by convincing a user to visit a specially crafted website to disclose sensitive information in memory.

These vulnerabilities exist when Microsoft Browsers improperly accesses objects in memory. A remote attacker could exploit these vulnerabilities by convincing a user to visit a specially crafted website using Internet Explorer. Successful exploitation of these vulnerabilities could trigger memory corruption which could allow the attacker to execute arbitrary code with the privileges of the target user.

This vulnerability exists due to improper parsing of the HTTP responses by a Microsoft browser. A remote attacker could exploit this vulnerability by hosting a website containing a specially crafted file and convincing the targeted user to open it or sending a specially crafted file via email and enticing the targeted user to open it. Successful exploitation of this vulnerability could allow an attacker to trick the user by redirecting them to specially crafted website hosting malicious or spoofed content.

These vulnerabilities exists due to improper handling of objects in memory. A remote attacker could exploit these vulnerabilities by enticing a user to visit a specially crafted website or open a malicious file using Internet Explorer which could lead to memory corruption. Successful exploitation of these vulnerabilities could allow the attacker to execute arbitrary code with the privileges of the target user.

These vulnerabilities exist in Internet Explorer due to improper implementation of the cross-domain policies. A remote attacker could exploit these vulnerabilities by enticing a user to click a specially crafted link. Successful exploitation of this vulnerability could allow an attacker to gain elevated privileges and access sensitive information from one domain and inject it into another domain.